* Process the entire disk with one pass, or at most two, to minimize seek time.

* Process the entire disk with one pass, or at most two, to minimize seek time.

−

==Evidence Falsification==

+

===Evidence Falsification===

* Automatically detect falsified digital evidence.

* Automatically detect falsified digital evidence.

−

==Sanitization==

+

===Sanitization===

* Detect and diagnose sanitization attempts.

* Detect and diagnose sanitization attempts.

+

===Timeline Analysis===

+

Write a new timeline viewer that supports:

+

* Logfile fusion (with offsets)

+

* Logfile correlation

+

* View logfiles in the frequency domain.

+

+

===Online Social Network Analysis===

+

* Find and download in a forensically secure manner all of the information in a social network (e.g. Facebook, LinkedIn, etc.) associated with a targeted individual.

+

* Determine who is searching for a targeted individual. This might be done with a honeypot, or documents with a tracking device in them, or some kind of covert Facebook App.

+

===Cell Phone Exploitation===

+

====Imaging====

+

* Image the contents of a cell phone physical memory using the JTAG interface.

+

====Interpretation====

+

* Develop a tool for reassembling information in a cell phone memory

==Programming Projects==

==Programming Projects==

Line 31:

Line 45:

* Extend [[fiwalk]] to report the NTFS "inodes."

* Extend [[fiwalk]] to report the NTFS "inodes."

−

==Timeline Analysis==

−

Write a new timeline viewer that supports:

−

* Logfile fusion (with offsets)

−

* Logfile correlation

−

* View logfiles in the frequency domain.

−

−

==Online Social Network Analysis==

−

* Find and download in a forensically secure manner all of the information in a social network (e.g. Facebook, LinkedIn, etc.) associated with a targeted individual.

−

* Determine who is searching for a targeted individual. This might be done with a honeypot, or documents with a tracking device in them, or some kind of covert Facebook App.

−

−

==Cell Phone Exploitation==

−

===Imaging===

−

* Image the contents of a cell phone physical memory using the JTAG interface.

−

===Interpretation===

−

* Develop a tool for reassembling information in a cell phone memory

==Corpora Development==

==Corpora Development==

===Realistic Disk Corpora===

===Realistic Disk Corpora===

−

There is need for realistic corpora that can be freely redistributed but do not contain any confidential personally identifiable information (PII).

+

There is need for realistic corpora that can be freely redistributed but do not contain any confidential personally identifiable information (PII). These disk images may be either of an external drive or of a system boot drive. The drive images should have signs of ''wear'' --- that is, they should have resident files, deleted files, partially overwritten files, contiguous files, and fragmented files.

−

+

−

These disk images may be either of an external drive or of a system boot drive. The drive images should have signs of ''wear'' --- that is, they should have resident files, deleted files, partially overwritten files, contiguous files, and fragmented files.

fiwalk Enhancements

Corpora Development

Realistic Disk Corpora

There is need for realistic corpora that can be freely redistributed but do not contain any confidential personally identifiable information (PII). These disk images may be either of an external drive or of a system boot drive. The drive images should have signs of wear --- that is, they should have resident files, deleted files, partially overwritten files, contiguous files, and fragmented files.